Close Menu
World Forbes – Business, Tech, AI & Global Insights
  • Home
  • AI
  • Billionaires
  • Business
  • Cybersecurity
  • Education
    • Innovation
  • Money
  • Small Business
  • Sports
  • Trump
What's Hot

US strikes first trade agreement with UK in a ‘breakthrough deal’ | International Trade News

May 8, 2025

Sequoia leads $1.5B tender offer for sales automation startup Clay

May 8, 2025

Valarian Bags $20M Seed Capital for ‘Isolation-First’ Infrastructure Tech

May 8, 2025
Facebook X (Twitter) Instagram
Trending
  • US strikes first trade agreement with UK in a ‘breakthrough deal’ | International Trade News
  • Sequoia leads $1.5B tender offer for sales automation startup Clay
  • Valarian Bags $20M Seed Capital for ‘Isolation-First’ Infrastructure Tech
  • Europol Announces More DDoS Service Takedowns, Arrests
  • Is adverse media screening RegTech’s quiet advantage?
  • Amazon’s newest AI tool is designed to enhance product listings
  • Possible Zero-Day Patched in SonicWall SMA Appliances
  • Asking chatbots for short answers can increase hallucinations, study finds
World Forbes – Business, Tech, AI & Global InsightsWorld Forbes – Business, Tech, AI & Global Insights
Thursday, May 8
  • Home
  • AI
  • Billionaires
  • Business
  • Cybersecurity
  • Education
    • Innovation
  • Money
  • Small Business
  • Sports
  • Trump
World Forbes – Business, Tech, AI & Global Insights
Home » Cisco Patches 35 Vulnerabilities Across Several Products
Cybersecurity

Cisco Patches 35 Vulnerabilities Across Several Products

adminBy adminMay 8, 2025No Comments3 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr WhatsApp Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email
Post Views: 4


Cisco on Wednesday announced patches for 35 vulnerabilities, including 26 as part of its semiannual IOS and IOS XE security advisory bundle publication.

The IOS updates fix one critical-severity and 16 high-severity bugs. The critical issue, tracked as CVE-2025-20188 (CVSS score of 10/10), is described as an arbitrary file upload flaw in the Out-of-Band Access Point (AP) image download feature of IOS XE software.

A hard-coded JSON Web Token (JWT) allows attackers to upload files by sending crafted HTTP requests to the AP image download interface.

“A successful exploit could allow the attacker to upload files, perform path traversal, and execute arbitrary commands with root privileges,” Cisco explains in its advisory.

While the security defect can be exploited remotely, without authentication, it only impacts Wireless LAN Controllers (WLCs) that have the Out-of-Band AP image download feature enabled. By default, it is disabled.

The most severe of the high-severity vulnerabilities in the semiannual security bundle could allow remote attackers to inject commands, cause a denial of service (DoS) condition, or elevate their privileges.

While the command injection (CVE-2025-20186) and privilege escalation (CVE-2025-20164) flaws require authentication, the DoS issues (CVE-2025-20154, CVE-2025-20182, and CVE-2025-20162) can be exploited by unauthenticated attackers.

The remaining high-severity defects patched in IOS and IOS XE software could lead, under certain conditions, to DoS, privilege escalation, or to the execution of persistent code at boot time.

Advertisement. Scroll to continue reading.

The semiannual security bundle also addresses medium-severity IOS software flaws that could be exploited to mount a cross-site request forgery (CSRF) attack, perform SNMP operations from denied sources, bypass traffic filters, read configuration or operational data, write arbitrary files to the system, remove arbitrary users, or cause a DoS condition.

On Wednesday, Cisco also announced fixes for high-severity bugs in the management API of Catalyst Center and the CLI of Catalyst SD-WAN Manager that could allow attackers to modify the outgoing proxy configuration settings and escalate privileges, respectively.

Multiple medium-severity vulnerabilities were also addressed with the Catalyst Center and Catalyst SD-WAN Manager updates.

Additionally, the tech giant announced that no patches will be released for CVE-2025-20137, a medium-severity bypass in the access control list (ACL) programming of Catalyst 1000 and Catalyst 2960L switches, because the vulnerable configuration is not supported.

“This vulnerability is due to the use of both an IPv4 ACL and a dynamic ACL of IP Source Guard on the same interface, which is an unsupported configuration. An attacker could exploit this vulnerability by attempting to send traffic through an affected device,” Cisco says.

Cisco says it is not aware of any of these vulnerabilities being exploited in the wild. However, it warns that proof-of-concept (PoC) code targeting two medium-severity issues (CVE-2025-20221, a traffic filter bypass in IOS XE SD-WAN; and CVE-2025-20147, an XSS flaw in Catalyst SD-WAN Manager) exists.

On Wednesday, Cisco also updated the list of products affected by the critical Erlang/OTP SSH security defect disclosed in mid-April, as well as the status of patches. Tracked as CVE-2025-32433 (CVSS score of 10) and exploitable without authentication, the flaw leads to remote code execution (RCE).

Users are advised to apply the available patches and workarounds as soon as possible. Additional information can be found on Cisco’s security advisories page.

Related: Cisco Patches 10 Vulnerabilities in IOS XR

Related: Vulnerabilities Patched in Atlassian, Cisco Products

Related: Vulnerabilities Expose Cisco Meraki and ECE Products to DoS Attacks

Related: Hackers Target Cisco Smart Licensing Utility Vulnerabilities



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
admin
  • Website

Related Posts

Valarian Bags $20M Seed Capital for ‘Isolation-First’ Infrastructure Tech

May 8, 2025

Europol Announces More DDoS Service Takedowns, Arrests

May 8, 2025

Possible Zero-Day Patched in SonicWall SMA Appliances

May 8, 2025

Improperly Patched Samsung MagicINFO Vulnerability Exploited by Botnet

May 8, 2025

Dozens of SysAid Instances Vulnerable to Remote Hacking

May 8, 2025

Masimo Manufacturing Facilities Hit by Cyberattack

May 8, 2025
Add A Comment
Leave A Reply Cancel Reply

Don't Miss
Billionaires

Skechers’ Greenbergs Set To Pocket Up To $1.1 Billion From Sale To 3G

May 6, 2025

Skechers founders Robert Greenberg (left) and Michael Greenberg (right) started the brand more than 30…

Trump Organization Admits President Still Controls His Business

May 6, 2025

Forbes Richest Person In Every State 2025

April 30, 2025

These Billionaire Signers Of The Giving Pledge Signers On Why The Philanthropy Group Still Matters

April 29, 2025
Our Picks

US strikes first trade agreement with UK in a ‘breakthrough deal’ | International Trade News

May 8, 2025

Sequoia leads $1.5B tender offer for sales automation startup Clay

May 8, 2025

Valarian Bags $20M Seed Capital for ‘Isolation-First’ Infrastructure Tech

May 8, 2025

Europol Announces More DDoS Service Takedowns, Arrests

May 8, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

About Us
About Us

Welcome to World-Forbes.com
At World-Forbes.com, we bring you the latest insights, trends, and analysis across various industries, empowering our readers with valuable knowledge. Our platform is dedicated to covering a wide range of topics, including sports, small business, business, technology, AI, cybersecurity, and lifestyle.

Our Picks

Sequoia leads $1.5B tender offer for sales automation startup Clay

May 8, 2025

Amazon’s newest AI tool is designed to enhance product listings

May 8, 2025

Asking chatbots for short answers can increase hallucinations, study finds

May 8, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

Facebook X (Twitter) Instagram Pinterest
  • Home
  • About Us
  • Advertise With Us
  • Contact Us
  • DMCA Policy
  • Privacy Policy
  • Terms & Conditions
© 2025 world-forbes. Designed by world-forbes.

Type above and press Enter to search. Press Esc to cancel.